Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61723
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2008:0965
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0965.

Lynx is a text-based Web browser.

An arbitrary command execution flaw was found in the Lynx lynxcgi: URI
handler. An attacker could create a web page redirecting to a malicious URL
that could execute arbitrary code as the user running Lynx in the
non-default Advanced user mode. (CVE-2008-4690)

Note: In these updated lynx packages, Lynx will always prompt users before
loading a lynxcgi: URI. Additionally, the default lynx.cfg configuration
file now marks all lynxcgi: URIs as untrusted by default.

A flaw was found in a way Lynx handled .mailcap and .mime.types
configuration files. Files in the browser's current working directory were
opened before those in the user's home directory. A local attacker, able to
convince a user to run Lynx in a directory under their control, could
possibly execute arbitrary commands as the user running Lynx. (CVE-2006-7234)

All users of Lynx are advised to upgrade to this updated package, which
contains backported patches correcting these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0965.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4690
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00066.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00143.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:217
http://www.mandriva.com/security/advisories?name=MDVSA-2008:218
http://www.openwall.com/lists/oss-security/2008/10/09/2
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11204
http://www.redhat.com/support/errata/RHSA-2008-0965.html
http://www.securitytracker.com/id?1021105
http://secunia.com/advisories/32416
http://secunia.com/advisories/32967
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
XForce ISS Database: lynx-lynxcgi-code-execution(46228)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46228
Common Vulnerability Exposure (CVE) ID: CVE-2006-7234
1021107
http://www.securitytracker.com/id?1021107
31917
http://www.securityfocus.com/bid/31917
32407
http://secunia.com/advisories/32407
32416
33568
MDVSA-2008:217
RHSA-2008:0965
SUSE-SR:2009:002
[oss-security] 20081025 CVE request: lynx (old) .mailcap handling flaw
http://www.openwall.com/lists/oss-security/2008/10/25/3
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=396949
https://bugzilla.redhat.com/show_bug.cgi?id=214205
lynx-mailcap-mimetype-code-execution(46132)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46132
oval:org.mitre.oval:def:9719
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9719
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.